10 encryption methodsIncluding Rijndael, the Advanced Encryption Standard (AES) approved by the U.S. National Institute of Standards and Technology (NIST) and the U.S. Computer Security Research Center (CSRC)

Data theft is increasing!If you think your computer files are secure... think again! The only way to guarantee the confidentiality of your computer files is by encrypting them, but if your encryption password is secretly being recorded by a keylogging trojan or virus, your files are no longer secure.

10 encryption methods, including the current AES (Advanced Encryption Standard) approved for use by the U.S. National Institute of Standards and Technology (NIST) and the U.S. Computer Security Research Center (CSRC).

Drag-and-drop capabilities.

True Windows™ shell menu integration (the right-click menu).

A professional install and uninstall program.

Built-in tutorial.

No 'back doors'.

No 'footprint' or ghost copies of unencrypted files left on the hard disk.

No storage of your encryption password...not in the registry, not in the file.... nowhere!

System Requirements

Pentium 90 or greater processor

Windows 95/98/ME/XP/NT/2000/2003

16 MB Ram (32 MB recommended)

9 MB hard disk space

USE A VALID EMAIL WHEN ORDERING! Your registration unlock code is emailed within 24 hours following purchase.

What are KeyLogging Trojans and Why are Encryption Programs Vulnerable to them?KeyLogging Trojans are software programs that run silently on a computer, recording every keystroke typed by the computer user and logging the information to a file or silently emailing them to another party.Keylogging Trojans are typically installed on a computer by someone with access, such as a spouse, an employer, or another party, but they can also be remotely installed by the computer user opening an email or visiting a webpage.

How much of a Threat are Keylogging Trojans to Modern Encryption Programs?Encryption technology has progressed to the point that many mathematical encryption methods are now considered unbreakable even for governmental researchers.This has resulted in a change in how encrypted files are cracked, a change away from brute-force mathematical decryption, towards secretly recording the encryption key (password) using keylogging trojans.The Anti-Phishing Working group (APWG) released a report, published in January of 2005, stating hackers are now starting to favor keylogging trojans over all other forms of social engineering attacks to gain access to encrypted data.Keylogging Trojans are now a typical component of most computer viruses.Since Keylogging trojans can take the form of installable EXEs, DLLs and many other file extensions, can hide in emails, on webpages, and in malicious software, they are virtually impossible to detect or defeat and new versions are created almost daily. According to recent studies, keylogging trojans represent the fastest growing threat to computer privacy today.

Until now, the only encryption programs capable of defeating a keylogging programs ability to capture the encryption password relied on ‘virtual keypads’, mouse-based interfaces that required the user to ‘click’ their password letters on a screen-based virtual keypad instead of typing them using their normal keyboard.This awkward approach has not been widely accepted by the general public, who prefer to type their password using their regular keyboard.The only other method of defeating a Keylogging Trojans ability to record the encryption password was through signature-based software products that globally shutdown keylogging programs when they are found on the user’s computer. Unfortunately, these ‘anti-keylogger’ programs depended on having the keylogging program’s name in their database collection and, since new keylogging trojans are created almost daily, these programs are outdated from almost the moment of their release. Such techniques are considered unreliable by most experts.

WinEncryptor is the ONLYencryption product in the world capable of defeating keylogging trojan's ability to capture the encryption password, without resorting to "virtual keypads" or other gimmicks.

KeyLogShieldWinEncryptor is the first encryption program in the world capable of defeating keylogging software without resorting to difficult to use, mouse based, 'virtual keypads'.WinEncryptor's KeyLogShieldwill render keylogging cracking of encrypted files obsolete.This represents a leap forward in modern encryption protection and is entirely unique in the world today.WinEncryptor features 10 encryption methods, including the current AES (Advanced Encryption Standard) approved for use by the U.S. National Institute of Standards and Technology (NIST) and the U.S. Computer Security Research Center (CSRC).We invite you to test WinEncryptor against any commercial keylogging program, to prove its ability to protect your encryption password against keylogging spying.

Smart DecryptWinEncryptor utilizes Smart Decrypt technology to decrypt encrypted files and folders.This feature greatly simplifies the decryption tasks, eliminates the need for the user to remember which encryption method they used, whether the file was compressed during encryption, and what the original filename was.Smart Decryptmeans you only have to remember your encryption password.Nothing else.

USE A VALID EMAIL WHEN ORDERING! Your registration unlock code is emailed within 24 hours following purchase.